
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A command injection vulnerability (CVE-2025-20029) was discovered in F5's BIG-IP iControl REST and BIG-IP TMOS Shell (tmsh) save command. The vulnerability was disclosed on February 5, 2025, affecting multiple versions of BIG-IP systems. This security flaw allows an authenticated attacker to execute arbitrary system commands on affected systems (F5 Advisory, NVD).
The vulnerability exists in the iControl REST API and the BIG-IP TMOS Shell (tmsh) save command functionality. It has been assigned CWE-78 classification (Improper Neutralization of Special Elements used in an OS Command). The vulnerability received a CVSS v3.1 base score of 8.8 (HIGH) and a CVSS v4.0 base score of 8.7 (HIGH), indicating its severe nature. The vulnerability affects BIG-IP versions 17.1.0-17.1.2, 16.1.0-16.1.5, and 15.1.0-15.1.10 (F5 Advisory, NVD).
The successful exploitation of this vulnerability allows an authenticated attacker to execute arbitrary system commands and create or delete files through the control plane. There is no data plane exposure. The high severity scores indicate the potential for significant system compromise if successfully exploited (F5 Advisory).
F5 has released patches for affected versions: 17.1.2.1, 16.1.5.2, and 15.1.10.6. Until patching is possible, temporary mitigations include restricting access to iControl REST by blocking access through self IP addresses and the management interface, and limiting SSH access to trusted networks only. Organizations should change Port Lockdown settings to 'Allow None' for each self IP address or use the 'Allow Custom' option while ensuring iControl REST access is disallowed (F5 Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”